Disinformation, hacking seen as top threats in Ipsos World Affairs report

The latest Ipsos World Affairs poll* for the Halifax Security Forum highlights global concerns about disinformation and hacking. Key findings include: These issues are seen as the leading threats in 2024. As disinformation campaigns and cyberattacks are increasingly recognized as global threats, it is clear that individuals, businesses, and governments must take proactive steps to … More Disinformation, hacking seen as top threats in Ipsos World Affairs report

Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

C-level executives, diplomats, and high-ranking IT managers usually have access to sensitive information, huge amounts of data, finances, or a combination of all these things. And adversaries know it. Anticipating all the precious data and access rights, cybercriminals and state-sponsored advanced persistent threat groups (APTs) are willing to invest a lot of time and money … More Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

A first look at threat intelligence and threat hunting tools

An overview of some of the most popular open-source tools for threat intelligence and threat hunting. As the term threat intelligence can be easily confounded with threat hunting, we will first endeavor to outline some of the differences between them. Threat intelligence refers to the aggregation and enrichment of data to create a recognizable profile … More A first look at threat intelligence and threat hunting tools

Google fixes actively exploited Chrome zero‑day

The latest Chrome update patches a bumper crop of security flaws across the browser’s desktop versions. Google has rolled out an update for its Chrome web browser to fix a bunch of security flaws, including a zero-day vulnerability that is known to be actively exploited by threat actors. The bugs affect the Windows, macOS, and … More Google fixes actively exploited Chrome zero‑day

Prime targets: Governments shouldn’t go it alone on cybersecurity

A year into the pandemic, ESET reveals new research into activities of the LuckyMouse APT group and considers how governments can rise to the cybersecurity challenges of the accelerated shift to digital. Earlier this year, a well-known APT group dubbed LuckyMouse (aka Emissary Panda, APT27) began exploiting several zero-day Microsoft Exchange Server vulnerabilities. Its end goal? … More Prime targets: Governments shouldn’t go it alone on cybersecurity